CVE-2023-4299

9.0 CRITICAL

📋 TL;DR

CVE-2023-4299 is an authentication bypass vulnerability in Digi RealPort Protocol that allows attackers to replay authentication packets to gain unauthorized access to connected industrial equipment. This affects organizations using Digi RealPort for serial-to-Ethernet connectivity in industrial control systems (ICS) and operational technology (OT) environments.

💻 Affected Systems

Products:
  • Digi RealPort
Versions: All versions prior to patched versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects RealPort protocol implementation across Digi products using this serial tunneling protocol.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of connected industrial equipment, potentially causing physical damage, production shutdowns, or safety incidents in critical infrastructure.

🟠

Likely Case

Unauthorized access to serial-connected devices allowing data theft, configuration changes, or disruption of industrial processes.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - If RealPort services are exposed to the internet, attackers can easily exploit this without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems can exploit this, but requires network access to RealPort services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Replay attacks are relatively simple to execute once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Digi security advisory for specific patched versions

Vendor Advisory: https://www.digi.com/resources/security/alerts/realport-cves

Restart Required: Yes

Instructions:

1. Review Digi security advisory ICSA-23-243-04 2. Download and apply appropriate firmware/software updates 3. Restart affected devices and services 4. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate RealPort services from untrusted networks and implement strict firewall rules

Access Control Lists

all

Implement IP-based access restrictions to limit which systems can connect to RealPort services

🧯 If You Can't Patch

  • Implement strict network segmentation and zero-trust principles for RealPort traffic
  • Deploy network monitoring and intrusion detection specifically for RealPort protocol anomalies

🔍 How to Verify

Check if Vulnerable:

Check RealPort version against Digi's patched versions list in their security advisory

Check Version:

Check device firmware/software version through Digi device management interface

Verify Fix Applied:

Verify updated version is running and test authentication mechanisms

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful access
  • Unusual source IP addresses accessing RealPort services

Network Indicators:

  • Repeated authentication packets from same source
  • RealPort traffic from unexpected network segments

SIEM Query:

source_port:771 AND (event_type:"authentication" OR protocol:"RealPort")

🔗 References

📤 Share & Export